Explainable fraud detection under fixed false positive rate


Abstract

Objective. Fraud detection systems operate under extreme class imbalance and strict operational alert budgets, where false positives create substantial review cost and customer friction. This study aims to develop and evaluate an explainability-aware fraud detection pipeline that is explicitly assessed at an operationally constrained decision threshold (fixed false positive rate) and to quantify how explanation patterns behave for true and false alerts in the high-precision regime.

Methods. Using the Credit Card Fraud Detection dataset (284,807 transactions; 492 frauds; 0.172% prevalence), we trained and compared four classifiers spanning interpretable baselines to high-performing ensembles: Logistic Regression, Random Forest, Histogram-Based Gradient Boosting, and XGBoost. To mirror real-world deployment, the decision threshold was tuned on a validation split to enforce FPR ≤ 1% and then applied unchanged to a held-out test set. Performance was reported using PR-AUC, ROC-AUC, recall at fixed FPR, precision, and precision@K. Statistical reliability was quantified via 1,000 stratified bootstrap resamples to obtain 95% confidence intervals. For interpretability, SHAP was used to compute global and local explanations, and we analyzed attribution concentration (fraction of total absolute SHAP mass captured by the top three features) for true positives versus false positives.

Results. At FPR ≤ 1%, all models achieved strong fraud capture (recall ≈ 0.79–0.83). Random Forest obtained the highest recall (0.829), while XGBoost achieved the highest PR-AUC (0.766). Logistic Regression remained competitive and achieved the highest precision at the operating point (0.190). Precision@100 was ~0.39–0.40 across all models, indicating comparable identification of the highest-confidence fraud cases. Explanation structure analysis showed substantial overlap between true positives and false positives, with mean attribution concentration of ~54% and ~55% respectively.

Conclusion. Under operationally fixed alert budgets, strong detection performance can be achieved while providing decision-level explanations; however, SHAP attribution patterns for false positives can closely resemble those for true fraud in high-precision regimes. Explanations are valuable for transparency and investigator context, but they should be treated as decision support rather than a reliable discriminator for triage on their own.
Ask to review this manuscript

Notes for potential reviewers

  • Volunteering is not a guarantee that you will be asked to review. There are many reasons: reviewers must be qualified, there should be no conflicts of interest, a minimum of two reviewers have already accepted an invitation, etc.
  • This is NOT OPEN peer review. The review is single-blind, and all recommendations are sent privately to the Academic Editor handling the manuscript. All reviews are published and reviewers can choose to sign their reviews.
  • What happens after volunteering? It may be a few days before you receive an invitation to review with further instructions. You will need to accept the invitation to then become an official referee for the manuscript. If you do not receive an invitation it is for one of many possible reasons as noted above.

  • PeerJ Computer Science does not judge submissions based on subjective measures such as novelty, impact or degree of advance. Effectively, reviewers are asked to comment on whether or not the submission is scientifically and technically sound and therefore deserves to join the scientific literature. Our Peer Review criteria can be found on the "Editorial Criteria" page - reviewers are specifically asked to comment on 3 broad areas: "Basic Reporting", "Experimental Design" and "Validity of the Findings".
  • Reviewers are expected to comment in a timely, professional, and constructive manner.
  • Until the article is published, reviewers must regard all information relating to the submission as strictly confidential.
  • When submitting a review, reviewers are given the option to "sign" their review (i.e. to associate their name with their comments). Otherwise, all review comments remain anonymous.
  • All reviews of published articles are published. This includes manuscript files, peer review comments, author rebuttals and revised materials.
  • Each time a decision is made by the Academic Editor, each reviewer will receive a copy of the Decision Letter (which will include the comments of all reviewers).

If you have any questions about submitting your review, please email us at [email protected].